We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full security. This deepens the relationship between the selective and full security models and provides a path for transferring the best qualities of selectively secure systems to fully secure systems. In particular, we present a Ciphertext-Policy Attribute-Based Encryption scheme that is proven fully secure while matching the efficiency of the state of the art selectively secure systems. © 2012 International Association for Cryptologic Research.
CITATION STYLE
Lewko, A., & Waters, B. (2012). New proof methods for attribute-based encryption: Achieving full security through selective techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7417 LNCS, pp. 180–198). https://doi.org/10.1007/978-3-642-32009-5_12
Mendeley helps you to discover research relevant for your work.